blob: f171ed49f37488e153e32994ec352103e5a2b1c7 [file] [log] [blame]
Harald Welte007a71e2012-07-18 19:47:56 +02001/* (C) 2010-2012 by Harald Welte <laforge@gnumonks.org>
Harald Welted82e0eb2011-12-06 21:53:42 +01002 *
3 * All Rights Reserved
4 *
Harald Weltee08da972017-11-13 01:00:26 +09005 * SPDX-License-Identifier: GPL-2.0+
6 *
Harald Welted82e0eb2011-12-06 21:53:42 +01007 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 2 of the License, or
10 * (at your option) any later version.
11 *
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
16 *
17 * You should have received a copy of the GNU General Public License along
18 * with this program; if not, write to the Free Software Foundation, Inc.,
19 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
20 *
21 */
22
Max38b17232017-12-01 19:06:21 +010023#include "config.h"
24
Harald Welted82e0eb2011-12-06 21:53:42 +010025#include <errno.h>
26#include <stdint.h>
Harald Welted318e612011-12-07 12:16:27 +010027#include <string.h>
Harald Welted82e0eb2011-12-06 21:53:42 +010028
29#include <osmocom/core/utils.h>
30#include <osmocom/core/linuxlist.h>
31#include <osmocom/core/plugin.h>
32
33#include <osmocom/crypt/auth.h>
34
Harald Welte007a71e2012-07-18 19:47:56 +020035/*! \addtogroup auth
36 * @{
Neels Hofmeyr87e45502017-06-20 00:17:59 +020037 * GSM/GPRS/3G authentication core infrastructure
Neels Hofmeyr17518fe2017-06-20 04:35:06 +020038 *
39 * \file auth_core.c */
Harald Welte007a71e2012-07-18 19:47:56 +020040
Harald Welted82e0eb2011-12-06 21:53:42 +010041static LLIST_HEAD(osmo_auths);
42
43static struct osmo_auth_impl *selected_auths[_OSMO_AUTH_ALG_NUM];
44
Neels Hofmeyr87e45502017-06-20 00:17:59 +020045/*! Register an authentication algorithm implementation with the core
Harald Welte007a71e2012-07-18 19:47:56 +020046 * \param[in] impl Structure describing implementation and it's callbacks
Neels Hofmeyrc7bf8d02016-05-08 22:23:40 +020047 * \returns 0 on success, or a negative error code on failure
Harald Welte007a71e2012-07-18 19:47:56 +020048 *
49 * This function is called by an authentication implementation plugin to
50 * register itself with the authentication core.
51 */
Harald Welted82e0eb2011-12-06 21:53:42 +010052int osmo_auth_register(struct osmo_auth_impl *impl)
53{
54 if (impl->algo >= ARRAY_SIZE(selected_auths))
55 return -ERANGE;
56
57 llist_add_tail(&impl->list, &osmo_auths);
58
59 /* check if we want to select this implementation over others */
60 if (!selected_auths[impl->algo] ||
61 (selected_auths[impl->algo]->priority > impl->priority))
62 selected_auths[impl->algo] = impl;
63
64 return 0;
65}
66
Neels Hofmeyr87e45502017-06-20 00:17:59 +020067/*! Load all available authentication plugins from the given path
Harald Welte007a71e2012-07-18 19:47:56 +020068 * \param[in] path Path name of the directory containing the plugins
Neels Hofmeyrc7bf8d02016-05-08 22:23:40 +020069 * \returns number of plugins loaded in case of success, negative in case of error
Harald Welte007a71e2012-07-18 19:47:56 +020070 *
71 * This function will load all plugins contained in the specified path.
72 */
Harald Welted82e0eb2011-12-06 21:53:42 +010073int osmo_auth_load(const char *path)
74{
75 /* load all plugins available from path */
Max38b17232017-12-01 19:06:21 +010076#if !defined(EMBEDDED)
Harald Welted82e0eb2011-12-06 21:53:42 +010077 return osmo_plugin_load_all(path);
Max38b17232017-12-01 19:06:21 +010078#else
79 return -1;
80#endif
Harald Welted82e0eb2011-12-06 21:53:42 +010081}
82
Neels Hofmeyr87e45502017-06-20 00:17:59 +020083/*! Determine if a given authentication algorithm is supported
Harald Welte007a71e2012-07-18 19:47:56 +020084 * \param[in] algo Algorithm which should be checked
Neels Hofmeyrc7bf8d02016-05-08 22:23:40 +020085 * \returns 1 if algo is supported, 0 if not, negative error on failure
Harald Welte007a71e2012-07-18 19:47:56 +020086 *
87 * This function is used by an application to determine at runtime if a
88 * given authentication algorithm is supported or not.
89 */
Harald Welted82e0eb2011-12-06 21:53:42 +010090int osmo_auth_supported(enum osmo_auth_algo algo)
91{
92 if (algo >= ARRAY_SIZE(selected_auths))
93 return -ERANGE;
94
95 if (selected_auths[algo])
96 return 1;
97
98 return 0;
99}
100
Harald Weltecd9cb902016-04-20 10:39:00 +0200101/* C5 function to derive UMTS IK from GSM Kc */
102static inline void c5_function(uint8_t *ik, const uint8_t *kc)
103{
104 unsigned int i;
105
106 for (i = 0; i < 4; i++)
107 ik[i] = kc[i] ^ kc[i+4];
108 memcpy(ik+4, kc, 8);
109 for (i = 12; i < 16; i++)
110 ik[i] = ik[i-12];
111}
112
113/* C4 function to derive UMTS CK from GSM Kc */
Maxceae1232016-06-27 18:12:49 +0200114void osmo_c4(uint8_t *ck, const uint8_t *kc)
Harald Weltecd9cb902016-04-20 10:39:00 +0200115{
116 memcpy(ck, kc, 8);
117 memcpy(ck+8, kc, 8);
118}
119
Neels Hofmeyr87e45502017-06-20 00:17:59 +0200120/*! Generate 3G CK + IK from 2G authentication vector
Harald Weltecd9cb902016-04-20 10:39:00 +0200121 * \param vec Authentication Vector to be modified
Neels Hofmeyrc7bf8d02016-05-08 22:23:40 +0200122 * \returns 1 if the vector was changed, 0 otherwise
Harald Weltecd9cb902016-04-20 10:39:00 +0200123 *
124 * This function performs the C5 and C4 functions to derive the UMTS key
125 * material from the GSM key material in the supplied vector, _if_ the input
Neels Hofmeyrc7bf8d02016-05-08 22:23:40 +0200126 * vector doesn't yet have UMTS authentication capability.
127 */
Harald Weltecd9cb902016-04-20 10:39:00 +0200128int osmo_auth_3g_from_2g(struct osmo_auth_vector *vec)
129{
130 if ((vec->auth_types & OSMO_AUTH_TYPE_GSM) &&
131 !(vec->auth_types & OSMO_AUTH_TYPE_UMTS)) {
132 c5_function(vec->ik, vec->kc);
Maxceae1232016-06-27 18:12:49 +0200133 osmo_c4(vec->ck, vec->kc);
Harald Weltecd9cb902016-04-20 10:39:00 +0200134 /* We cannot actually set OSMO_AUTH_TYPE_UMTS as we have no
135 * AUTN and no RES, and thus can only perform GSM
136 * authentication with this tuple.
Neels Hofmeyrc7bf8d02016-05-08 22:23:40 +0200137 */
Harald Weltecd9cb902016-04-20 10:39:00 +0200138 return 1;
139 }
140
141 return 0;
142}
143
Neels Hofmeyr87e45502017-06-20 00:17:59 +0200144/*! Generate authentication vector
Harald Welte007a71e2012-07-18 19:47:56 +0200145 * \param[out] vec Generated authentication vector
146 * \param[in] aud Subscriber-specific key material
Katerina Barone-Adesic28c6a02013-02-15 13:27:59 +0100147 * \param[in] _rand Random challenge to be used
Neels Hofmeyrc7bf8d02016-05-08 22:23:40 +0200148 * \returns 0 on success, negative error on failure
Harald Welte007a71e2012-07-18 19:47:56 +0200149 *
150 * This function performs the core cryptographic function of the AUC,
151 * computing authentication triples/quintuples based on the permanent
152 * subscriber data and a random value. The result is what is forwarded
153 * by the AUC via HLR and VLR to the MSC which will then be able to
154 * invoke authentication with the MS
155 */
Harald Welted82e0eb2011-12-06 21:53:42 +0100156int osmo_auth_gen_vec(struct osmo_auth_vector *vec,
157 struct osmo_sub_auth_data *aud,
158 const uint8_t *_rand)
159{
Harald Welte781bd5d2011-12-06 22:23:52 +0100160 struct osmo_auth_impl *impl = selected_auths[aud->algo];
Harald Welte4afdd5d2011-12-07 02:38:18 +0100161 int rc;
Harald Welted82e0eb2011-12-06 21:53:42 +0100162
163 if (!impl)
164 return -ENOENT;
165
Harald Welte4afdd5d2011-12-07 02:38:18 +0100166 rc = impl->gen_vec(vec, aud, _rand);
167 if (rc < 0)
168 return rc;
169
170 memcpy(vec->rand, _rand, sizeof(vec->rand));
171
172 return 0;
Harald Welted82e0eb2011-12-06 21:53:42 +0100173}
174
Neels Hofmeyr87e45502017-06-20 00:17:59 +0200175/*! Generate authentication vector and re-sync sequence
Harald Welte007a71e2012-07-18 19:47:56 +0200176 * \param[out] vec Generated authentication vector
177 * \param[in] aud Subscriber-specific key material
Harald Welte007a71e2012-07-18 19:47:56 +0200178 * \param[in] auts AUTS value sent by the SIM/MS
Neels Hofmeyr03ab9a62017-02-03 05:00:24 +0100179 * \param[in] rand_auts RAND value sent by the SIM/MS
Katerina Barone-Adesic28c6a02013-02-15 13:27:59 +0100180 * \param[in] _rand Random challenge to be used to generate vector
Neels Hofmeyrc7bf8d02016-05-08 22:23:40 +0200181 * \returns 0 on success, negative error on failure
Harald Welte007a71e2012-07-18 19:47:56 +0200182 *
183 * This function performs a special variant of the core cryptographic
184 * function of the AUC: computing authentication triples/quintuples
185 * based on the permanent subscriber data, a random value as well as the
186 * AUTS and RAND values returned by the SIM/MS. This special variant is
187 * needed if the sequence numbers between MS and AUC have for some
Thorsten Alteholza81055d2017-03-02 22:13:48 +0100188 * reason become different.
Harald Welte007a71e2012-07-18 19:47:56 +0200189 */
Harald Welted82e0eb2011-12-06 21:53:42 +0100190int osmo_auth_gen_vec_auts(struct osmo_auth_vector *vec,
191 struct osmo_sub_auth_data *aud,
Neels Hofmeyr03ab9a62017-02-03 05:00:24 +0100192 const uint8_t *auts, const uint8_t *rand_auts,
Harald Welted82e0eb2011-12-06 21:53:42 +0100193 const uint8_t *_rand)
194{
Harald Welte781bd5d2011-12-06 22:23:52 +0100195 struct osmo_auth_impl *impl = selected_auths[aud->algo];
Neels Hofmeyr3b8cb392017-02-21 19:54:36 +0100196 int rc;
Harald Welted82e0eb2011-12-06 21:53:42 +0100197
198 if (!impl || !impl->gen_vec_auts)
199 return -ENOENT;
200
Neels Hofmeyr3b8cb392017-02-21 19:54:36 +0100201 rc = impl->gen_vec_auts(vec, aud, auts, rand_auts, _rand);
202 if (rc < 0)
203 return rc;
204
205 memcpy(vec->rand, _rand, sizeof(vec->rand));
206
207 return 0;
Harald Welted82e0eb2011-12-06 21:53:42 +0100208}
Harald Weltea5ab1622011-12-07 02:33:11 +0100209
Harald Welte1c72bfb2012-04-04 22:05:24 +0200210static const struct value_string auth_alg_vals[] = {
Harald Weltea5ab1622011-12-07 02:33:11 +0100211 { OSMO_AUTH_ALG_NONE, "None" },
212 { OSMO_AUTH_ALG_COMP128v1, "COMP128v1" },
213 { OSMO_AUTH_ALG_COMP128v2, "COMP128v2" },
214 { OSMO_AUTH_ALG_COMP128v3, "COMP128v3" },
215 { OSMO_AUTH_ALG_XOR, "XOR" },
216 { OSMO_AUTH_ALG_MILENAGE, "MILENAGE" },
217 { 0, NULL }
218};
219
Neels Hofmeyr87e45502017-06-20 00:17:59 +0200220/*! Get human-readable name of authentication algorithm */
Harald Weltea5ab1622011-12-07 02:33:11 +0100221const char *osmo_auth_alg_name(enum osmo_auth_algo alg)
222{
223 return get_value_string(auth_alg_vals, alg);
224}
225
Neels Hofmeyr87e45502017-06-20 00:17:59 +0200226/*! Parse human-readable name of authentication algorithm */
Harald Weltea5ab1622011-12-07 02:33:11 +0100227enum osmo_auth_algo osmo_auth_alg_parse(const char *name)
228{
229 return get_string_value(auth_alg_vals, name);
230}
Harald Welte007a71e2012-07-18 19:47:56 +0200231
Neels Hofmeyr26e30b12017-10-07 04:41:22 +0200232const struct value_string osmo_sub_auth_type_names[] = {
233 { OSMO_AUTH_TYPE_NONE, "None" },
234 { OSMO_AUTH_TYPE_GSM, "GSM" },
235 { OSMO_AUTH_TYPE_UMTS, "UMTS" },
236 { 0, NULL }
237};
238
Neels Hofmeyraa84b712017-12-18 03:12:01 +0100239/* Derive GSM AKA ciphering key Kc from UMTS AKA CK and IK (auth function c3 from 3GPP TS 33.103 ยง
240 * 4.6.1).
241 * \param[out] kc GSM AKA Kc, 8 byte target buffer.
242 * \param[in] ck UMTS AKA CK, 16 byte input buffer.
243 * \param[in] ik UMTS AKA IK, 16 byte input buffer.
244 */
245void osmo_auth_c3(uint8_t kc[], const uint8_t ck[], const uint8_t ik[])
246{
247 int i;
248 for (i = 0; i < 8; i++)
249 kc[i] = ck[i] ^ ck[i + 8] ^ ik[i] ^ ik[i + 8];
250}
251
Harald Welte007a71e2012-07-18 19:47:56 +0200252/*! @} */